- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for ClaimUserinfo (0.07 sec)
-
internal/config/identity/openid/providercfg.go
} func newProviderCfgFromConfig(getCfgVal func(cfgName string) string) providerCfg { return providerCfg{ DisplayName: getCfgVal(DisplayName), ClaimName: getCfgVal(ClaimName), ClaimUserinfo: getCfgVal(ClaimUserinfo) == config.EnableOn, ClaimPrefix: getCfgVal(ClaimPrefix), RedirectURI: getCfgVal(RedirectURI), RedirectURIDynamic: getCfgVal(RedirectURIDynamic) == config.EnableOn,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 4.6K bytes - Viewed (0) -
internal/config/identity/openid/help.go
Optional: true, Type: "string", }, config.HelpKV{ Key: ClaimUserinfo, Description: `Enable fetching claims from UserInfo Endpoint for authenticated user` + defaultHelpPostfix(ClaimUserinfo), Optional: true, Type: "on|off", }, config.HelpKV{ Key: KeyCloakRealm,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Jun 23 14:45:27 UTC 2023 - 4.3K bytes - Viewed (0) -
internal/config/identity/openid/jwt.go
pCfg, ok := r.arnProviderCfgsMap[arn] // If claim user info is enabled, get claims from userInfo // and overwrite them with the claims from JWT. if ok && pCfg.ClaimUserinfo { if accessToken == "" { return errors.New("access_token is mandatory if user_info claim is enabled") } uclaims, err := pCfg.UserInfo(ctx, accessToken, r.transport) if err != nil { return err
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 06 02:46:36 UTC 2024 - 8.4K bytes - Viewed (0)